πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26.1K subscribers
89.3K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ“’ What is the National Cyber Security Centre (NCSC) and what does it do? πŸ“’

The NCSC plays a critical role in keeping the UK safe from cyber attacks, but can also help businesses get ahead of attacks through strategic changes.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ MSPs are struggling with cyber security skills shortages πŸ“’

A shortage of tools and difficulties keeping pace with solutions were also ranked as key issues for MSPs.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ Generative AI security tools are a risky enterprise investment – WithSecure wants to change that πŸ“’

WithSecure sets its sights on the vast array of security copilot offerings with its new generative AI experience Luminen, which promises to make prompt engineering a thing of the past.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 10 Best SIEM Tools for 2024 🦿

Looking for the best SIEM tool? Check out our list and find the security information and event management solution that fits your business needs.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Price Drop: This Complete Ethical Hacking Bundle is Now $40 🦿

Get a comprehensive, potentially lucrative ethical hacking education with 18 courses on today's top tools and tech. This bundle is just 39.97 through 531.

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
🦿 Hiring Kit: Cryptography Engineer 🦿

Cryptography engineers often collaborate with cybersecurity teams to integrate robust cryptographic solutions into software, hardware and network infrastructure, addressing potential vulnerabilities and mitigating risks associated with data breaches or cyberattacks. This hiring kit, written by Franklin Okeke for TechRepublic Premium, provides a practical framework you can use to hire the ideal cryptography engineer for your ...

πŸ“– Read more.

πŸ”— Via "Tech Republic"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ U.S. Sentences 31-Year-Old to 10 Years for Laundering $4.5M in Email Scams πŸ–‹οΈ

The U.S. Department of Justice DoJ has sentenced a 31yearold to 10 years in prison for laundering more than 4.5 million through business email compromise BEC schemes and romance scams. Malachi Mullings, 31, of Sandy Springs, Georgia pleaded guilty to the money laundering offenses in January 2023. According to court documents, Mullings is said to have opened 20 bank accounts in the name of.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ New Research Warns About Weak Offboarding Management and Insider Risks πŸ–‹οΈ

A recent study by Wing Security found that 63 of businesses may have former employees with access to organizational data, and that automating SaaS Security can help mitigate offboarding risks.  Employee offboarding is typically seen as a routine administrative task, but it can pose substantial security risks, if not handled correctly. Failing to quickly and thoroughly remove access for.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ–‹οΈ Microsoft Uncovers 'Moonstone Sleet' β€” New North Korean Hacker Group πŸ–‹οΈ

A neverbeforeseen North Korean threat actor codenamed Moonstone Sleet has been attributed as behind cyber attacks targeting individuals and organizations in the software and information technology, education, and defense industrial base sectors with ransomware and bespoke malware previously associated with the infamous Lazarus Group. "Moonstone Sleet is observed to set up fake companies and.

πŸ“– Read more.

πŸ”— Via "The Hacker News"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” #Infosec2024: How Williams Racing Relies on Data Security for Peak Performance πŸ“”

Formula One team Williams Racing shares how it prioritizes data security with password management to safeguard sensitive information.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” New North Korean Hacking Group Identified by Microsoft πŸ“”

Moonstone Sleet is a newly observed threat group targeting companies for financial and cyber espionage objectives.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ‘1
πŸ“” #Infosec2024: Decoding SentinelOne's AI Threat Hunting Assistant πŸ“”

SentinelOne will present a threathunting demonstration during which a security analyst will compete against a nontechnical person using its AI assistant.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“” Internet Archive Disrupted by Sustained and β€œMean” DDoS Attack πŸ“”

The Internet Archive said sustained DDoS attacks have disrupted access to its preserved web pages and other historical archives.

πŸ“– Read more.

πŸ”— Via "Infosecurity Magazine"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ“’ This new hacker group is targeting software developers with phony job offers and fake projects πŸ“’

From targeting software developers to infiltrating IT firms, the Moonstone Sleet hacker group has an unusually wide range of attacks and isnt shy about using them.

πŸ“– Read more.

πŸ”— Via "ITPro"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Mastermind Behind Biden AI Deepfake Indicted for Robocall Scheme πŸ•΅οΈβ€β™‚οΈ

The political consultant who wrote the script and paid for the deepfake audio used in robocalls was fined 6 million by the FCC.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Exploit for Fortinet Critical RCE Bug Allows SIEM Root Access πŸ•΅οΈβ€β™‚οΈ

Corporate admins should patch the maxseverity CVE202423108 immediately, which allows unauthenticated command injection.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ BlackSuit Claims Dozens of Victims With Carefully Curated Ransomware πŸ•΅οΈβ€β™‚οΈ

Researchers went indepth on an attack by the threat group, which mainly targets US companies in the education and industrial goods sectors, specifically to maximize financial gain.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ•΅οΈβ€β™‚οΈ Why CVEs Are an Incentives Problem πŸ•΅οΈβ€β™‚οΈ

It's time to rethink the pivotal role incentives play in shaping behavior to find and disclose software vulnerabilities. More accurate guidance to reflect realworld risks and a tiered verification process to establish potential impact could slow misleading submissions.

πŸ“– Read more.

πŸ”— Via "Dark Reading"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  GRR 3.4.7.4 πŸ› 

GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action downloading file, listing a directory, etc. GRR server infrastructure consists of several components frontends, workers, UI servers and provides webbased graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  jSQL Injection 0.96 πŸ› 

jSQL Injection is a lightweight application used to find database information from a distant server. jSQL Injection is also part of the official penetration testing distribution Kali Linux and is included in various other distributions like Pentest Box, Parrot Security OS, ArchStrike and BlackArch Linux. This is the source code release.

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity
πŸ›  Proxmark3 4.18589 Custom Firmware πŸ› 

This is a custom firmware written for the Proxmark3 device. It extends the currently available firmware. This release is nicknamed "Aurora".

πŸ“– Read more.

πŸ”— Via "Packet Storm - Tools"

----------
πŸ‘οΈ Seen on @cibsecurity